咨询与建议

限定检索结果

文献类型

  • 11,297 篇 会议
  • 5,157 篇 期刊文献
  • 229 册 图书

馆藏范围

  • 16,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,213 篇 工学
    • 8,122 篇 计算机科学与技术...
    • 6,775 篇 软件工程
    • 1,984 篇 信息与通信工程
    • 1,310 篇 控制科学与工程
    • 1,096 篇 生物工程
    • 814 篇 电气工程
    • 730 篇 生物医学工程(可授...
    • 676 篇 机械工程
    • 598 篇 电子科学与技术(可...
    • 554 篇 光学工程
    • 415 篇 安全科学与工程
    • 347 篇 仪器科学与技术
    • 340 篇 化学工程与技术
    • 325 篇 建筑学
    • 323 篇 动力工程及工程热...
  • 4,508 篇 理学
    • 2,646 篇 数学
    • 1,232 篇 生物学
    • 828 篇 物理学
    • 752 篇 统计学(可授理学、...
    • 630 篇 系统科学
    • 349 篇 化学
  • 3,144 篇 管理学
    • 1,908 篇 管理科学与工程(可...
    • 1,351 篇 图书情报与档案管...
    • 946 篇 工商管理
  • 709 篇 医学
    • 620 篇 临床医学
    • 552 篇 基础医学(可授医学...
    • 329 篇 药学(可授医学、理...
  • 482 篇 法学
    • 371 篇 社会学
  • 328 篇 教育学
    • 318 篇 教育学
  • 319 篇 经济学
    • 318 篇 应用经济学
  • 171 篇 农学
  • 70 篇 文学
  • 48 篇 军事学
  • 28 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,069 篇 computer science
  • 1,019 篇 software enginee...
  • 310 篇 deep learning
  • 304 篇 application soft...
  • 291 篇 computational mo...
  • 267 篇 data mining
  • 254 篇 machine learning
  • 243 篇 computer archite...
  • 229 篇 software
  • 206 篇 accuracy
  • 202 篇 software systems
  • 194 篇 feature extracti...
  • 190 篇 training
  • 188 篇 internet of thin...
  • 188 篇 support vector m...
  • 181 篇 programming
  • 172 篇 educational inst...
  • 167 篇 laboratories
  • 166 篇 semantics
  • 163 篇 wireless sensor ...

机构

  • 354 篇 college of compu...
  • 198 篇 department of co...
  • 143 篇 state key labora...
  • 118 篇 department of co...
  • 115 篇 department of co...
  • 107 篇 school of softwa...
  • 105 篇 department of co...
  • 90 篇 department of co...
  • 85 篇 department of co...
  • 84 篇 department of co...
  • 82 篇 school of inform...
  • 75 篇 department of co...
  • 73 篇 department of co...
  • 64 篇 school of comput...
  • 53 篇 department of co...
  • 53 篇 department of co...
  • 47 篇 department of co...
  • 47 篇 software enginee...
  • 46 篇 department of co...
  • 46 篇 school of softwa...

作者

  • 66 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 46 篇 xiao qin
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 30 篇 mian ajmal
  • 30 篇 zhao jian
  • 29 篇 shen furao
  • 24 篇 muhammad waseem ...
  • 24 篇 kotagiri ramamoh...
  • 23 篇 christopher leck...
  • 22 篇 parizi reza m.
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 21 篇 niyato dusit
  • 21 篇 rehman attique u...
  • 21 篇 liu yang
  • 21 篇 wang wei
  • 20 篇 dozier gerry

语言

  • 15,132 篇 英文
  • 1,447 篇 其他
  • 130 篇 中文
  • 10 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering and Computer Science Department"
16683 条 记 录,以下是851-860 订阅
排序:
S3GCL: Spectral, Swift, Spatial Graph Contrastive Learning  41
S3GCL: Spectral, Swift, Spatial Graph Contrastive Learning
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Wan, Guancheng Tian, Yijun Huang, Wenke Chawla, Nitesh V. Ye, Mang National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China Department of Computer Science University of Notre Dame United States Taikang Center for Life and Medical Sciences Wuhan University Wuhan China
Graph Contrastive Learning (GCL) has emerged as a highly effective self-supervised approach in graph representation learning. However, prevailing GCL methods confront two primary challenges: 1) They predominantly oper... 详细信息
来源: 评论
The Good, The Bad, and Why: Unveiling Emotions in Generative AI  41
The Good, The Bad, and Why: Unveiling Emotions in Generative...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Li, Cheng Wang, Jindong Zhang, Yixuan Zhu, Kaijie Wang, Xinyi Hou, Wenxin Lian, Jianxun Luo, Fang Yang, Qiang Xie, Xing Microsoft Research Beijing China CAS Institute of Software Beijing China Department of Computer Science William & Mary WilliamsburgVA United States School of Psychology Beijing Normal University Beijing China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong
Emotion significantly affects our daily behaviors and interactions. Although recent generative AI models, such as large language models, have shown impressive performance in various tasks, it remains unclear whether t... 详细信息
来源: 评论
Annolog: A Query Processing Framework for Modelling and Reasoning with Annotated Data
收藏 引用
Journal of computers (Taiwan) 2023年 第2期34卷 81-97页
作者: Zou, Haochen Wang, Dejian Xiao, Yang Department of Computer Science and Software Engineering Concordia University Montreal Canada
Data annotation is the categorization and labelling of data for applications, such as machine learning, artificial intelligence, and data integration. The categorization and labelling are done to achieve a specific us... 详细信息
来源: 评论
AI Ethics in Healthcare-A Survey  23
AI Ethics in Healthcare-A Survey
收藏 引用
23rd IEEE International Conference on software Quality, Reliability, and Security Companion, QRS-C 2023
作者: Singh, Bhavraaj Rahim, Muhammad Abdul Basit Ur Hussain, Shahid Rizwan, Muhammad Abid Zhao, Jie California State University Department of Computer Science Long BeachCA United States Penn State University Department of Computer Science Behrend PA United States Florida Polytechnic University Department of Computer Science LakelandFL United States Penn State University Department of Computer Science and Software Engineering Behrend PA United States
In the realm of healthcare, the exponential growth of Artificial Intelligence has precipitated a need to scrutinize its ethical implications. This research undertakes a comprehensive survey to unravel the intricate ta... 详细信息
来源: 评论
There Is More to Dwell Than Meets the Eye: Toward Better Gaze-Based Text Entry Systems With Multi-Threshold Dwell  25
There Is More to Dwell Than Meets the Eye: Toward Better Gaz...
收藏 引用
2025 CHI Conference on Human Factors in Computing Systems, CHI 2025
作者: Mutasim, Aunnoy K Bashar, Mohammad Raihanul Lutteroth, Christof Batmaz, Anil Ufuk Stuerzlinger, Wolfgang Simon Fraser University VancouverBC Canada Department of Computer Science & Software Engineering Concordia University MontrealQC Canada Computer Science University of Bath Bath United Kingdom
Dwell-based text entry seems to peak at 20 words per minute (WPM). Yet, little is known about the factors contributing to this limit, except that it requires extensive training. Thus, we conducted a longitudinal study... 详细信息
来源: 评论
Enhanced Mask R-CNN blur instance segmentation based on generated adversarial network  2
Enhanced Mask R-CNN blur instance segmentation based on gene...
收藏 引用
2nd International Conference on Electronic Information Technology, EIT 2023
作者: Han, Yuehu Chen, Shijie Zhang, Xiaoyan Department of Software Engineering Chongqing University of Posts and Telecommunications Chongqing China Department of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China
Aiming at the detection of blur SEM nanoparticle images, a blur instance segmentation network (BL-Mask R-CNN) based on generative adversarial network deblurring convolution block (Deblur) and Mask R-CNN instance segme... 详细信息
来源: 评论
Gamification of E-Learning Apps via Acceptance Requirements Analysis  19
Gamification of E-Learning Apps via Acceptance Requirements ...
收藏 引用
19th International Conference on Evaluation of Novel Approaches to software engineering, ENASE 2024
作者: Calabrese, Federico Piras, Luca Al-Obeidallah, Mohammed Ghazi Egbikuadje, Benedicta Oghenevoke Alkubaisy, Duaa Department of Information Engineering and Computer Science University of Trento Trento Italy Department of Computer Science Middlesex University London United Kingdom Department of Software Engineering Al Ain University Abu Dhabi United Arab Emirates College of Applied Studies and Community Service Imam Abdulrahman Bin Faisal University Dammam Saudi Arabia
In the last few years, and particularly during and after the COVID-19 pandemic, E-Learning has become a very important and strategic asset for our society, relevant both for academic and industry settings, involving p... 详细信息
来源: 评论
Evaluating LoRaWAN performance in intentional and unintentional DoS attacks by legacy 900MHz network devices  6
Evaluating LoRaWAN performance in intentional and unintentio...
收藏 引用
6th International Conference on Advanced Communication Technologies and Networking, CommNet 2023
作者: Bang, Seokhyeon Jang, Junyoung Ro, Minju Choi, Yuseon Kwon, Doyong Lee, Kangyeon Smith, Anthony Chung-Ang University School of Computer Science and Engineering Seoul Korea Republic of Chonnam National University Department of Software Engineering Gwangju Korea Republic of Kyungpook National University School of Computer Science and Engineering Daegu Korea Republic of Purdue University Department of Computer and Information Technology IN United States
The deployment of LoRaWAN on the Internet of Things (IoT) has increased since its advent and LoRaWAN now predominates the IoT market over other Low Powered Wide Area Networks (LPWAN). However, since LoRaWAN uses Chirp... 详细信息
来源: 评论
Advancing Efficient Large-Scale Constraint Optimization Problem Solving by Integrating Machine Learning and Automated Reasoning  2
Advancing Efficient Large-Scale Constraint Optimization Prob...
收藏 引用
2nd International Workshop on Spatio-Temporal Reasoning and Learning, STRL 2023
作者: Kong, Shufeng School of Software Engineering Sun Yat-sen University Guangzhou China Department of Computer Science Cornell University Ithaca United States
来源: 评论
A Brief Overview of Deep Learning Approaches for IoT Security  4
A Brief Overview of Deep Learning Approaches for IoT Securit...
收藏 引用
4th International Conference on Computing, Mathematics and engineering Technologies, iCoMET 2023
作者: Hassaan Khalid, Muhammad Sharif, Hanan Rehman, Faisal Naeem Ullah, Muhammad Shaukat, Shahbaz Maqsood, Hadia Nouman Ali, Chaudhry Hussain, Ayaz Iftikhar, Irfana Lahore Leads University Department of Computer Science & Information Technology Lahore Pakistan Mehran University of Engineering and Technology Szab Department of Software Engineering Khairpur Mir's Pakistan
The continuous increasing usage of internet devices in many areas of human life is continuously growing and demanding a proper method to protect these IoT devices from cyber-attacks and vulnerabilities. In this aspect... 详细信息
来源: 评论